期刊文献+

充分利用视觉冗余的图像不同域信息掩密术

High Capcity Image Steganography Based on Transform Domain
下载PDF
导出
摘要 充分利用人类视觉冗余实现安全地秘密信息嵌入是信息隐藏技术追求的目标.现有图像信息掩密技术很多是在图像数据相同域实现的.本文将信号量化压缩编码的理论和方法应用于信息掩密,提出了一种充分利用人类视觉冗余的图像不同域信息掩密新方法并设计了三种纠错方法保证了密文信息的准确盲提取和复原.实验表明,该算法对空域图像数据的统计特性改变较少,具有更高的隐藏容量和安全性. A new image steganography mothod simulating qaantization processing in image Joint Photographic Experts Group compression is presented. Three kinds of error correctiong coding is applied to assure that hidden information can be retrieved accurately. Experimental results demonstrate that the proposed method has high capacity good vision performance.
出处 《电子学报》 EI CAS CSCD 北大核心 2006年第B12期2429-2433,共5页 Acta Electronica Sinica
基金 国家863基金(No.2005AA145010) 国家242基金(No.2005C43)
关键词 信息掩密 视觉冗余 隐藏容量 空间域 频域 steganography vision redundance hidden capacity space domain frequency domain
  • 相关文献

参考文献13

  • 1尤新刚 周琳娜 郭云彪.信息隐藏学科的主要分支及术语[A]..全国第三届信息隐藏学术研讨会(CIHW''2001)[C].西安:西安电子科技大学出版社,2001..
  • 2Ingemar J Cox. A secure robust watermark for multimedia[A].1st Workshop on Information Hiding[C]. UK: University of Cambridge, 1996. 143 - 156.
  • 3Podilchuk C I,Zeng W J. Image-adaptive watermarking using visual models[J]. IEEE Journal on Selected Areas in Communications, 1998,16(4) :525 - 539.
  • 4Swanson M D, Zhu B, et al. Transparent robust image watermarking [ A]. Proc IEEE Int Conf Image Processing [ C].Switzerland: Lausanne Press, 1996.211 - 214.
  • 5Suthaharan S. Perceptually tuned robust watermarking scheme for digital images [ J ]. Pattern Recognition Letters, 2000, 21(2) :145- 149.
  • 6Rarni M ,Bartolini F,et al. Improved wavelet-based watermarking through pixel-wise masking [ J ]. IEEE Transactions on Iraage Processing,2001,10(5) :783 - 791.
  • 7Steganography Software for Windows [ DB/OL ]. http://members. tripod, com/steganography/stego/software, html, 1996 - 04 - 16/1996 - 08 - 05.
  • 8Wesffeld, Pfitzmann. High capacity despite better steganalysis[ A]. Moskowitz. Information Hiding 4th International Workshop[ C ]. Berlin: Springer-Verlag Press, 2001.289 - 302.
  • 9Provos. Defending against statistical steganalysis [A].10th USENIX Security Symposium [ C ]. New York: Academic Press,2001. 189 - 195.
  • 10Jianyun Xu, Andrew H, et al. JPEG compression immune steganography using wavelet transform [ A ]. International Conference on Information Technology [ C ]. Berlin: Springer-Verlag Press, 2004.205 - 211.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部